Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From model checking to a temporal proof for partial models: preliminary example., , , , and . CoRR, (2017)TamperProof: a server-agnostic defense for parameter tampering attacks on web applications., , , , and . CODASPY, page 129-140. ACM, (2013)Ranking Abstraction as Companion to Predicate Abstraction., , and . FORTE, volume 3731 of Lecture Notes in Computer Science, page 1-12. Springer, (2005)Formal Verification of Backward Compatibility of Microcode., , , , , , , , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 185-198. Springer, (2005)IIV: An Invisible Invariant Verifier., , , and . CAV, volume 3576 of Lecture Notes in Computer Science, page 408-412. Springer, (2005)Invisible Safety of Distributed Protocols., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 528-539. Springer, (2006)Automatic Verification of Probabilistic Free Choice., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 208-224. Springer, (2002)On What Linda Is: Formal Description of Linda as a Reactive System., and . COORDINATION, volume 1282 of Lecture Notes in Computer Science, page 187-204. Springer, (1997)From Model Checking to a Temporal Proof., and . SPIN, volume 2057 of Lecture Notes in Computer Science, page 1-14. Springer, (2001)Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness., , , , , and . CSF, page 145-160. IEEE Computer Society, (2013)